Why Mean Time to Repair Is Not Always A Useful Security Metric
January 14 2023Analyzing and learning from incidents is the ideal path to finding more insightful data and metrics, according to the VOID report.
Read moreAnalyzing and learning from incidents is the ideal path to finding more insightful data and metrics, according to the VOID report.
Read moreGood advice on buying squid. I like to buy whole fresh squid and clean it myself. As usual, you can also use this squid post to talk about the security...
Read morePassword manager accounts may have, ironically, been compromised via simple credential stuffing, thanks to password reuse.
Read moreThe bargain T95 Android TV device was delivered with preinstalled malware, adding to a trend of Droid devices coming out-of-the-box tainted.
Read moreRhadamanthys spreads through Google Ads that redirect to bogus download sites for popular workforce software — as well as through more typical malicious emails.
Read moreHigh-profile software provider compromises in the past few months show that threat actors are actively targeting the services underpinning corporate infrastructure. Here's what to do about it.
Read moreWith the $7.2M contract, Cloudflare will enhance resilience and simplify security for .gov domain users.
Read moreEstablish clear and consistent processes and standards to scale lite threat modeling's streamlined approach across your organization.
Read moreWith the release of ChatGPT, I’ve read many random articles about this or that threat from the technology. This paper is a good survey of the field:...
Read moreCritical national infrastructure, widespread cybercrime, and cyber insecurity are major risks in the report
Read more
Recent Comments